Hello @Divya Mohan P,
I understand the confusion caused by the recent inconsistency with the RoleSessionName
used by Microsoft Sentinel when assuming the AWS role.
According to the official Microsoft documentation, the session name should start with MicrosoftSentinel_
. This had been working consistently until around March 27, 2025, when it was observed that the session name changed to MicrosoftDefenderForClouds_
, which led to integration failures for some users.
The value of the sts:RoleSessionName
parameter must have the exact prefix MicrosoftSentinel_
As confirmed by @Pauline Mbabu, this change was later reverted, and MicrosoftSentinel_
is the correct and supported session name prefix. We will find the cause of the change made.
For consistency and reliability, it is recommended to continue using MicrosoftSentinel_
in the AWS IAM trust policy.Hope this helps!
If this answer was helpful, please click "Accept the answer" and mark Yes
, as this can help other community members.
If you have any other questions or are still experiencing issues, feel free to ask in the "comments" section, and I'd be happy to help.